• Title/Summary/Keyword: 자산식별

Search Result 101, Processing Time 0.028 seconds

Analysis of Withdrawal Strategies in Retirement Assets Reflecting Risk Aversion Based on Programmed Withdrawal (위험회피성향을 반영한 퇴직자산 지급방식 분석에 관한 연구 - Programmed Withdrawal 중심으로)

  • Yeo, Jeong-Mi;Kang, Jung-Chul;Sung, Joo-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.5
    • /
    • pp.653-666
    • /
    • 2010
  • Under the retirement pension plan enforced since December 2005, retirees can just choose the payout strategy either of a lump sum allowance or of an annuity in receiving the retirement benefit. Therefore, it is imperative to review and introduce the program withdrawal system enforced by countries with mature pension plan, and complement the limitations of the current payout strategy in the future. In this study, the appropriateness of each of the payout strategies related to the program withdrawal system is examined in terms of shortfall risk and bequest fund per each risk propensity through the expected utility model that reflects the age of the retiree.

The Efficiency of the Large Logistics Providers Using the SBM Model and the Panel Cointegrating Vectors (여분기반분석모형과 패널공적분벡터를 이용한 대형물류기업의 효율성)

  • Mo, Soo-Won;Park, Hong-Gyun
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.3
    • /
    • pp.135-146
    • /
    • 2011
  • A voluminous research on efficiency employs the DEA(Data Envelope Analysis) models. There are, however, only very few that have an interest in the factors influencing such efficiencies. We, furthermore, do not see any studies which analyze the long-term efficiency of the logistics providers using the panel cointegration techniques. The purpose of this paper, hence, is to evaluate the efficiency, analyse its determinants and show a long-term relationship between turnover and the other variables employing the SBM(Slack Based Measure) model, Tobit model, the panel procedure and the FMOLS(Fully Modified OLS). The panel data are composed of 9 individuals and 6 years. The panel cointegrating vectors show that the group coefficient of asset and employees is not only significant but has expected signs, while some of the individual coefficients are insignificant or/and exhibit wrong signs. The panel cointegrating vectors from fully modified OLS also indicate that the estimated coefficients of the panel analysis tend to be overvalued and the asset influences the turnover far greater than the employee does.

An Approach to Developing Service Descriptions Based on Product Line (프로덕트 라인 기반 서비스 명세 생성 방법)

  • Park, Joon-Seok;Moon, Mi-Kyeong;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.747-754
    • /
    • 2009
  • Software product line engineering is an approach to creating core assets by systematically exploits common that can be highly reusableand different characteristics in related system families that is domain. By adapting this approachin object and component paradigm, software productivity is extended. Recently, Software development paradigm is changed to service oriented paradigm which is using services that are core assets. Therefore, to develop service oriented software more flexible, systematic and to enhance business agility about business changes, we need adaptation of product line to creation of services that are core assets. In this paper, we propose an approach to create and specify domain service through combine of product line and service oriented paradigm. Domain service explicitly specifies commonality and variability by domain service common/optional property variability, operation type variability, message type variability. By using this approach, it can support efficient and flexible service oriented development by producing various services through customization of domain service for the purpose.

Data-driven Interactive Planning Methodology for EPC Plant Projects (EPC 플랜트 프로젝트의 초기 공정계획을 위한 통합 데이터 활용 방안)

  • Wang, Hankyeom;Choi, Jaehyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.2
    • /
    • pp.95-104
    • /
    • 2019
  • EPC plant projects are large and complex, requiring systematic working methodologies, accumulated data, and thorough planning through communications between the entities. In this study, the method of extracting the process planning information using asset data of the plant project and using it to present the initial process plan is presented through the concept of IAP(Interactive Planning). In order to carry out the effective IAP at the early stage of the project, this study extracted the schedule element information from the asset data, created the process plan for each work package, and applied it to the sample project case. Through the proposed IAP methodology, it is possible to promote the utilization of asset data, to identify schedule risks, and to develop countermeasures, which can form the basis for establishing the process management strategy to successfully complete the project.

A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities (국내 원자력 시설 통합 취약점 분석 프레임워크 연구)

  • Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Cyber attacks on national infrastructure, including large-scale power outages in Ukraine, have continued in recent years. As a result, ICS-CERT vulnerabilities have doubled compared to last year, and vulnerabilities to industrial control systems are increasing day by day. Most control system operators develop vulnerability countermeasures based on the vulnerability information sources provided by ICS-CERT in the United States. However, it is not applicable to the security of domestic control systems because it does not provide weaknesses in Korean manufacturers' products. Therefore, this study presents a vulnerability analysis framework that integrates CVE, CWE, CAPE, and CPE information related to the vulnerability based on ICS-CERT information (1843 cases). It also identifies assets of nuclear facilities by using CPE information and analyzes vulnerabilities using CVE and ICS-CERT. In the past, only 8% of ICS-CERT's vulnerability information was searched for information on any domestic nuclear facility during vulnerability analysis, but more than 70% of the vulnerability information could be searched using the proposed methodology.

The roles of Subcontractors' Entrepreneurship on the Relationship Commitment towards the Parent Companies (수급사업자의 기업가정신이 관계몰입을 유도하는 경로)

  • Nak Hwan Choi;Cheol Seob Byeon;Yong Gyun Lee
    • Asia Marketing Journal
    • /
    • v.13 no.1
    • /
    • pp.51-84
    • /
    • 2011
  • It seems essential to examine the factors that may affect relationship commitment of subcontractors to parent companies in the industrial market in Korea in an effort to construct a win-win-type cooperative network among them. Lots of studies have been focusing on the consumer goods market. Relatively few studies have been focused on industrial market. In the industrial goods market subcontractors used to sell their parts or services only to a small number of parent companies in a large quantity, resulting in decisive control of subcontractors over the quality of parent companies' finished goods. This is why relationship between subcontractors and parent companies is extremely important. From this viewpoint, this study aims to survey and analyze empirically the paths leading to relationship commitment of subcontractors toward the parent companies which are required to incite them to build up a collaborative network by means of subcontractors' entrepreneurship. For this aim, market orientation effects of entrepreneurship as well as factors of performance and trust are particularly set forth as the bases of developing hypotheses in this study in order to explore the paths from entrepreneurship to relationship commitment as follows. First, the path of entrepreneurship-market orientation-communication-trust- relationship commitment; second, the path of entrepreneurship-market orientation-performance-relationship commitment; third, the path of entrepreneurship-market orientation-transaction specific asset investment -trust-relationship commitment; and fourth, the path in which the entrepreneurship is expected to promote direct transaction specific asset investment by parent companies to induce their trust and, eventually, relationship commitment of subcontractors. The outcomes of the empirical analysis in this study may be summed up as follows: First, the conclusions of preceding studies are also supported here by the fact that the entrepreneurship of subcontractors promotes their market orientation (hypothesis 9), indicating that the entrepreneurship can facilitate collection, proliferation of and response to market informations. On the contrary, however, the assumption that the entrepreneurship of subcontractors might directly accelerate transaction specific asset investment by parent companies (hypothesis 8) is rejected. Second, although the influence of subcontractors' entrepreneurship on parent companies' investment of assets peculiar to their transactions is not affirmed, the assumption is found to be supported that subcontractors' market orientation would expedite the parent companies' investment of assets peculiar to their transactions. Moreover, it is also confirmed that parent companies' investment of assets peculiar to transactions would promote subcontractors' trust toward the parent companies (hypothesis 6), signifying that parent companies may level up their trust in subcontractors when they make great amount of efforts to invest in the assets peculiar to transactions, not behaving opportunistically, Third, the hypotheses 4 and 5 also turn out to be supported by the analysis as the former assumes that market orientation could promote communication and the latter relates that the communication between subcontractors and parent companies would prompt trust, both results in affirming that market orientation could introduce open communication to speed up sharing of information and that sharing of information by way of communication might give an impetus to trust. Fourth, the assumption that subcontractors' market orientation would expedite performance (hypothesis 3) is also proved favorably to the significant level equivalent to that of preceding studies. Fifth, same as preceding studies, it is also verified in this study that the benefit (outcomes) awarded by parent companies to subcontractors will be a direct cause exercising a positive impact upon relationship commitment(hypothesis 2) and that the trust of subcontractors toward parent companies may have affirmative influence on the relationship commitment(hypothesis 1). Overall, the first, second and third paths are identified as being supported by the hypotheses among constituent factors, while the fourth path is deemed meaningless since it is shown that the entrepreneurship exercises no effects on parent companies' investment in the assets peculiar to transactions.

  • PDF

A Metric-based Methodfor Evaluating Product Line Architecture (프로덕트라인 아키텍처의 정량성 평가 기법)

  • Chang Soo-Ho;La Hyun-Jung;Kim Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.5
    • /
    • pp.449-459
    • /
    • 2006
  • Product Line Engineering (PLE) has been widely accepted as a representative software reuse methodology by using core assets. As a key element of core assets, product line architecture (PLA) should be generic to a set of applications in the product line (PL). However, the difference between PLA and single system architecture has not been treated well enough, so evaluating PLA still remains as one of the difficult tasks in PLE. In this paper, we identify two intrinsic but overlooked issues in PLA; variability propagation chain and conflicts between architectural elements. And, we present a metric-based methodto evaluate PLA from the perspective of the two issues. We believe that the two issues in PLA and the evaluation method would make designing high-quality PLA more feasible and effective.

Framework for Developing RFID Applications Based on Product Line Architecture (프로덕트라인 아키텍처 기반 RFID 애플리케이션 개발을 위한 프레임워크)

  • Moon, Mi-Kyeong;Kim, Han-Jun;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.773-782
    • /
    • 2007
  • Software produce line engineering is a method that prepares for future reuse and supports seamless reuse in the application development process. Analyzing the commonality and variability between products in a product line is one of the essential concerns that must be considered when building a product line. In this paper, we suggest to combine a product line engineering approach with RFID applications technology. More concretely, common activities are identified among the RFID-enable applications and the variability in the common activities is analyzed in detail. Then, we suggest reusable product line architecture as a product line asset. In addition, as a tool for supporting this research, a framework which provides both reusable product line architecture for REID applications and the components that implement concrete realization of the architecture is developed. Sharing a common architecture and reusing assets to deploy recurrent services may be considered an advantage in terms of economic significance and overall quality.

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

A Study on the Reference System for Spatial Information of Railway Object (철도 선로 및 시설물 공간정보 참조체계에 관한 연구)

  • Won, Jong-Un
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.441-448
    • /
    • 2014
  • The application of spatial information has drawn significant attention from a wide range of industries. Railway spatial information facilitates the cooperation among related parties and improves the efficiency of asset management and operations. This study proposes the structure of Railway Object IDentifier(ROID) on railway spatial information. Current facility management and train operation are based on relative positioning system. Despite many advantages, relative positioning system causes serious problems such as the entire reconfiguration of positioning in the case of line change. Another major concern is the interface compatibility between individual facilities with different relative positioning. ROID based on absolute positioning addresses these issues, allowing the information exchange and convergence between independent parties. This study proposes ROID based on OID standard with object IDentifier and service object-oriented reference system. Our ROID employs the absolute positioning and the unique identifier, maintaining the compatibility with existing management system.